The Dangers of Straying from the Path, WhatsApp: Not Special for Envoys, FBI Snooped, Pixels and Privacy, Blocking Breaches, and Broadening Compliance Directives. It's CISO Intelligence for Tuesday 21st January 2025!
Today's topics: do you know where you're going to? WhatsApp not being in the diplomatic bag, breaking through the Fed's defenses, the downside of the breadcrumb trail, holding back the breaches, and spreading the compliance net.
💡
"Gives me everything I need to be informed about a topic" - __UK.Gov__
Table of Contents
1. Your HTTPS Redirection Risk Exposure: Are You Being Led Astray?
2. Star Blizzard Strikes: WhatsApp's Cloudy Day
3. FBI's Faux Pas: When Logs Leak
4. Tracking Pixels: Small Dots, Big Privacy Problems
5. How to Detect Identity Breaches (Before It’s Too Late)
6. How Not to NIS: Tackling Compliance with Essential Services
Sign up for CISO Intelligence.
21st century industry insights for the modern CISO
It won't hurt, I promise.
Email sent! Check your inbox to complete your signup.
No spam. Unsubscribe anytime.
Your HTTPS Redirection Risk Exposure: Are You Being Led Astray?
_Because sometimes the shortest distance between two secure points is NOT a straight line._
What You Need to Know
In today's sprawling world of web browsing, HTTP to HTTPS redirection vulnerabilities make for a fertile ground for attackers to exploit. These security gaps can expose businesses to data breaches, man-in-the-middle attacks, and serious reputational harm. As an executive management group, it's crucial to prioritize evaluation and mitigation of these vulnerabilities in your online interfaces. Immediate evaluation and patching are recommended under your guidance.
CISO focus: Web Application Security
Sentiment: Strong Negative
Time to Impact: Immediate
*
HTTP to HTTPS redirection, a seemingly innocuous process, can manifest as a significant vulnerability for companies striving to secure their online presence. Despite the simplicity of prefixing a website with the secure 'https', the path an end-user takes during redirection can provide cybercriminals a chance to launch various attacks, exposing businesses to significant risk.
The Hidden Risks of HTTP to HTTPS Redirection
Redirecting a user from HTTP to HTTPS is a fundamental step for many organizations as they secure internal and external websites. Yet, improper implementation of this transition introduces a plethora of security threats, including:
Man-in-the-Middle Attacks: When redirecting, data traffic remains susceptible until it reaches the HTTPS destination, allowing attackers to intercept sensitive information.
Data Breaches: Once intercepted, user data like login credentials can easily be compromised during poorly managed redirects.
Reputational Damage: Security lapses, especially ones involving HTTPS redirection, can lead to customer mistrust and potentially irreversible harm to a company's reputation.
*
The Technical Breakdown
Some of the prevalent redirection issues include:
Mixed Content Issues: Mixing HTTPS-secured and non-secure (HTTP) elements on the same page weakens encryption, making data vulnerable to interception.
Protocol Downgrade Attacks: Attackers manipulate users into connecting over HTTP, bypassing the implemented security protocols.
Open Redirects: Configuration mistakes that allow hackers to redirect users seamlessly to malicious websites under the guise of the original, trusted website.
Businesses should be aware that these vulnerabilities are not confined to technical experts. Attack vectors linked to redirection are increasingly becoming user-centric, leveraging basic internet activities to facilitate exploitation.
What Can Be Done?
Mitigating these risks requires an understanding that HTTPS redirection security relies neither solely on the technology nor the user but the seamless interaction between both. Key strategies include:
Strict Transport Security (HSTS): Implement HSTS policies to ensure browsers only engage with secure (HTTPS) versions of your site.
Regular Audits: Conduct comprehensive reviews and adaptations of all online interfaces to ensure proper redirection protocols are in place.
Secure Configuration of Web Servers: Avoid the use of multi-domain wildcard certificates, and ensure individual certificates are correctly configured.
*
Is It All Over HTTPS?
Worry not, as corrective measures are within arm's reach to organizations vigilant enough to act. Industry research and expert viewpoints (Kaspersky, OWASP, and UpGuard) underline the urgency in addressing HTTPS redirection vulnerabilities now to stave off far-reaching consequences.
*
Vendor Diligence Questions
1. How do your solutions identify and mitigate HTTPS redirection vulnerabilities?
2. What consulting services do you offer to rectify existing HTTP/HTTPS risk exposures?
3. Can you provide case studies demonstrating success in securing HTTPS transitions for similar firms?
Action Plan
1. Identify and Prioritize Vulnerabilities: Use scanning tools to detect existing vulnerable redirects.
2. Implement HSTS Headers : Ensure your web servers set these headers, obliging user agents to interact over HTTPS.
3. Stay Updated : Keep abreast of evolving threats and mitigation techniques through continuous training and active participation in cybersecurity forums.
Beware the Redirect!
While securing the journey from HTTP to HTTPS may seem an uphill battle, understanding the risks and proactively implementing robust security measures can profoundly decrease exposure to potential threats. As businesses grapple with inherent web vulnerabilities, strategic implementation of best practices will foster user trust and safeguard the organizational reputation.
*
Source: Your HTTPS Redirection Risk Exposure | UpGuard
*
Star Blizzard Strikes: WhatsApp's Cloudy Day
_When WhatsApp gets splashy with diplomats, the security umbrella better be big!_
What You Need to Know
In an alarming twist, cybercriminals under the moniker "Star Blizzard" have exploited WhatsApp to target high-value diplomats. Executives must evaluate and bolster secure communication protocols and mandate immediate reviews of current app usage policies to safeguard sensitive interactions.
CISO focus: Communication Security - App Exploitation
Sentiment: Strong Negative
Time to Impact: Immediate
*
Recent revelations point to the 'Star Blizzard' hacker group exploiting WhatsApp vulnerabilities to breach communication networks among high-value diplomats globally. In essence, this sophisticated campaign underlines the critical vulnerabilities that mainstream communication apps can harbor, especially when sensitive diplomatic data is in play.
The Breakdown of Star Blizzard's Plot
Who are they targeting?
Star Blizzard zeroed in on diplomats from nations known for their high-stake activities and diplomatic exchanges—efforts evidently focused on intercepting confidential international correspondence.
What's their method?
By leveraging unauthorized backend channels, the group manipulated WhatsApp’s communication pathways, planting malware designed to intercept and manipulate communication data without detection.
Why WhatsApp?
Despite its unmatched popularity and claim of providing secure, end-to-end encrypted messaging, WhatsApp's vulnerabilities were laid bare in this meticulously coordinated operation, questioning its reliability for high-stake communication.
Consequences for Global Diplomacy
Data security breaches of this magnitude can have a seismic impact on how nations deal with each other. Star Blizzard’s attack could equate to potential information leaks that may sway diplomatic relations or disrupt negotiations in volatile regions.
1. Diplomatic Disasters:
Breaches could result in miscommunications or leakages at high management levels, affecting international relations and trust.
2. Operational Overhaul Needed:
Increased necessity for agile, secure communication methodologies, likely including a re-evaluation of currently trusted channels.
3. Financial Ramifications:
Potential shifts in market dynamics if sensitive economic strategies were intercepted, leading to significant financial ripple effects.
Securing the Digital Embassies
This hacking incident serves as a clarion call to governments, prompting an urgent overhaul and evaluation of their digital and communication fortresses. Key considerations include:
Revamping Communications:
Nations must rethink their reliance on commercial communication apps for sensitive data exchanges, weighing the cost of convenience against potential breaches.
Heightened Monitoring:
Enhanced monitoring, potentially with AI insight systems, to detect suspicious activities in communication flows in real-time is essential.
Bespoke Secure Connections:
Developing custom, high-security communication channels tailored specifically for diplomatic use could be a cornerstone of future security frameworks.
Not-So-WhatsAppy Ending
App vulnerabilities pose a unique threat vector that's often underestimated. As Star Blizzard has made alarmingly clear, there's immense need for preemptive, stringent protocols governing digital communications in high-stake environments.
*
Vendor Diligence Questions
How frequently does the vendor conduct penetration testing for their applications?
Are there specific SLAs for escalation procedures in the event of a suspected breach?
What is the vendor's policy on sharing security audit results with clients?
Action Plan
1. Immediate App Review:
Conduct an immediate audit of all potentially vulnerable communication apps used within your organization.
2. Employee Training:
Initiate comprehensive training programs to make staff aware of phishing schemes and promote secure communication habits.
3. Strengthening Policies:
Develop and enforce stronger BYOD (Bring Your Own Device) and secure communication policies to prevent unauthorized access and potential intrusion.
4. Engagement with Vendors:
Ask vendors critical diligence questions ensuring they uphold the highest standards of application security.
5. Increase Threat Intelligence Sharing:
* Encourage partnerships with international agencies to share threat intelligence and response strategies effectively.
*
Source: Star Blizzard hackers abuse WhatsApp to target high-value diplomats
*
FBI's Faux Pas: When Logs Leak
_When log entries turn into entry points, the plot thickens faster than a redacted FBI file._
What You Need to Know
The FBI recently notified agents about a potential data breach involving the unauthorized access of phone logs, potentially stretching back a year. This breach carries significant implications for security protocols and data integrity. The executive management team is advised to prioritize a comprehensive review of logging systems and strengthen their incident response strategies to mitigate further exposure risk.
CISO Focus: Data Breach, Incident Response
Sentiment: Negative
Time to Impact: Immediate
*
The FBI's Data Debacle
The Federal Bureau of Investigation (FBI) recently issued an alert to its agents, voicing concerns over a breach involving unauthorized access to phone logs. The breach, believed to have occurred last year, raises pressing questions about the integrity and security of the FBI’s data handling procedures. As the Bureau scrambles to assess the damage and manage potential fallout, the situation underscores the broader vulnerabilities inherent in digital communication systems.
Understanding the Breach
Timeline : The breach is suspected to have happened more than a year ago, but only recently came to light.
Data Compromised : The breach encompasses phone logs, potentially including confidential communication metadata.
Scope : While the exact scale remains unclear, the implications are vast given the sensitive nature of FBI communications.
Immediate Concerns
The primary worry surrounding this breach centers on the sensitive nature of the data potentially exposed. Phone logs can reveal patterns of communication that may compromise both the strategic and operational efforts of the FBI. This not only places ongoing investigations in jeopardy but also threatens the personal safety of agents involved.
Long-term Implications
Operational Security : If adversaries have had access for over a year, they have potentially exploited this to an unknowable extent, impacting operational effectiveness and safety.
Reputation Damage : With increasing scrutiny over how federal agencies handle data breaches, the FBI's reputation may suffer, impacting public and international cooperation.
Policy Review : This event will likely become a catalyst for revisiting and reinforcing data protection policies within the agency.
Steps Being Taken
The FBI is keenly focused on damage control, initiating thorough internal investigations and potentially reassessing its security infrastructure. While it's clear that immediate action is required, the Bureau also faces the challenge of ensuring long-term resilience against future breaches.
A Log-Tastrophe Averted?
While full damage control remains underway, this incident with the FBI serves as a stark reminder that even the most sophisticated organizations are not immune to cybersecurity risks. As the digital landscape continues to evolve, constant vigilance and adaptive security protocols are essential to safeguard sensitive information from prying eyes.
The Urgency of Cyber Vigilance
With this breach, the necessity for maintaining stringent security measures becomes glaringly evident. As digital communication and surveillance systems grow more complex, so too do the challenges in guarding against unauthorized access.
*
Vendor Diligence Questions
1. How does your system securely log and protect access logs to prevent unauthorized disclosure?
2. What measures do you have in place to detect and respond to long-term unauthorized access that might have gone unnoticed?
3. How quickly can your solutions adapt to identified vulnerabilities post-breach?
Action Plan
Here’s an actionable roadmap for the cybersecurity team reporting to the CISO:
1. Immediate Incident Review
Perform a detailed autopsy of the breach, focusing on understanding entry points and system weaknesses.
Isolate affected systems from the network to prevent further unauthorized access.
2. Enhance Security Posture
Implement additional layers of encryption for communication metadata.
Conduct frequent security audits on logging systems.
Increase the frequency of security training for all personnel.
3. Communication Strategy
Establish a communication line to inform agents about the breach status and protective measures.
Prepare a public statement to manage reputational impact if needed.
4. System Upgrade and Vigilance
Invest in advanced intrusion detection systems that provide real-time insight into anomalies.
Develop and test response plans for quick containment and recovery from similar breaches.
*
Source: FBI Warned Agents It Believes Phone Logs Hacked Last Year
*
Tracking Pixels: Small Dots, Big Privacy Problems
_Of all the pixels in the world, these are the ones to watch._
What You Need to Know
The deployment of tracking pixels across websites and emails constitutes a silent privacy threat that may inadvertently expose sensitive corporate data. Executive management must prioritize understanding these pixels' capabilities and implications, initiating strategic cybersecurity measures to mitigate potential exploitation. Immediate cross-departmental discussions are warranted to address the associated risks of unauthorized data tracking within your organization. A directive is required for technical teams to implement robust monitoring and blocking measures concerning tracking pixels.
CISO focus: Privacy and Data Protection
Sentiment: Strong Negative
Time to Impact: Immediate
*
How Tracking Pixels Are Compromising Corporate Confidentiality
Tracking pixels—those invisible single-pixel images embedded within websites and emails—are not just innocent little guests; they're more like ghosts slipping under the corporate cybersecurity radar. Concealed in the unseen corners of digital communication, these pixels silently collect data, impacting both privacy and security in ways companies can't afford to ignore.
What are Tracking Pixels?
Hidden within HTML code or email communication, tracking pixels are typically transparent GIF or PNG files, only one pixel in size. Sent to a user's device by an unseen force, these pixels have one mission: to collect user data without the user ever knowing.
Key Capabilities
User Interaction Data: Monitoring user engagement, including clicking, scrolling, and time spent on a page or email.
IP Address Acquisition: Capturing geographical data and potentially mapping user locations.
Device and Software Information: Profiling users based on their browser settings, device specifications, operating systems, and more.
Why Should Organizations Care?
While marketers use tracking pixels to enhance user experience through personalized ads, their presence also opens a gateway for cyber attackers who sniff out corporate vulnerabilities. Malicious use of these pixels could lead to critical data breaches, exposing sensitive information and resulting in costly legal penalties.
Potential Risks Include
Data Leakage: Company secrets or sensitive data could be inadvertently shared with unwanted third parties.
Security Breaches: Unauthorized access to corporate networks and classified information.
Non-Compliance Fines: Breaching GDPR or other data protection regulations, leading to substantial financial repercussions.
Real-Life Consequences
Recently, numerous high-profile breaches involved data exfiltration via tracking pixels, underscoring their potential as a security weakness. Organizations such as Facebook and Google have faced significant backlash and penalties for mishandling tracking data, costing them not just money but also user trust and brand reputation.
Steps to Safeguard Your Organization
There are effective methods companies can use to counteract potential threats posed by tracking pixels. These methods hinge on robust cybersecurity practices that alert and protect against unwanted data collection.
Protect Your Digital Spaces
Deploy Pixel Blockers: Utilize browser extensions and email tools designed to detect and block invisible tracking.
Enhance Employee Training: Educate staff on recognizing and mitigating phishing scams using embedded pixels.
Update Privacy Policies: Regularly revise policies to ensure transparency regarding data collection and third-party involvement.
A Pixel-Perfect Ending? Unlikely.
While tracking pixels will never entirely vanish from the digital landscape, businesses can minimize their risk exposure by adopting proactive defense mechanisms. The key is vigilance, coupled with a robust understanding of how these tiny tracking titans function. By doing so, companies take charge of their data ecosystem, safeguarding both their privacy and their reputation.
*
Vendor Diligence Questions
1. Does the vendor use tracking pixels within their software or services, and what data is collected through these pixels?
2. What measures does the vendor have in place to ensure tracking pixels do not breach client confidentiality or regulatory compliance?
3. How does the vendor communicate updates or changes to tracking practices that might affect customer data privacy?
Action Plan
1. Audit and Assess : Conduct a comprehensive audit to identify where tracking pixels are currently being used across corporate emails and websites.
2. Implement Monitoring Tools : Deploy tools that can effectively monitor, analyze, and block undesirable tracking activity.
3. Conduct Employee Workshops : Organize training sessions to educate employees about the dangers of tracking pixels and precautions they should take.
4. Enhance Data Privacy Policies : Ensure that existing policies clearly articulate the organization's position on tracking data and third-party collaborations.
*
Source: How Tracking Pixels Impact Cybersecurity | UpGuard
How to Detect Identity Breaches (Before It’s Too Late)
_"Finding a needle in a haystack is easy till the whole haystack becomes a needle-factory."_
What You Need to Know
Cyber identity breaches are a growing threat, with immediate ramifications for financial loss, reputational damage, and regulatory penalties. Executives need to understand that strategic investment in sophisticated detection technologies and staff training is vital. Today's digital landscape necessitates tools and protocols for timely detection and response to protect critical assets and maintain customer trust.
CISO focus: Identity and Access Management
Sentiment: Strong Positive
Time to Impact: Immediate
*
Detecting Identity Breaches 101: When "Alarm Bells" Should Really Ring
In the world of interconnected systems and ever-evolving threats, identity breaches remain one of the starkest reminders of how vulnerable our digital ecosystems are. Identity theft can lead not only to personal loss but colossal corporate ramifications. The challenges entailed in detecting these breaches before they snowball into disasters is what will define organizational resilience in this digital era.
Understanding the Epicenter
The true peril of identity breaches lies in the difficulty of timely detection. Unsurprisingly, identity-related data tops the black market wish list. Often, attacks go unnoticed until the damage balloons beyond control—illustrating the importance of proactive monitoring tools and agile incident response strategies.
* Early Indicators : Anomalies such as unauthorized access attempts or irregular system behaviors often serve as early warning signals. Finesse in recognizing these cues is crucial but often overlooked.
* Tech-Savvy Cybercriminals : Today’s cybercriminals deploy sophisticated methods, camouflaging their activities amidst legitimate transactions. Thus, embracing and enhancing identity verification technologies is pivotal.
Tools of the Trade
Combatting these threats requires a fortified line of defense through advanced technological frameworks:
1. Multifactor Authentication (MFA) : Considered the frontline saint of cybersecurity, MFA drastically curtails incidents of unauthorized access by requiring multiple credentials.
2. Behavioral Analysis Software : This identifies irregular access patterns and flags suspicious activities earlier, shifting from reactive to proactive threat defense.
3. Zero Trust Architecture : By establishing a context-based security framework, organizations can ensure meticulous scrutiny for each access attempt, fostering a secure environment.
4. Encryption and Tokenization : Protecting data at rest and in transit ensures that even if breaches occur, valuable information remains out of unauthorized reach.
The Human Factor
Technology alone, however, cannot shoulder the responsibility. Human vigilance is key. Investments in cybersecurity training and awareness are equally vital attributes in the fight against identity breaches. Personnel at all levels should be prepared to identify potential threats and act accordingly.
* Cybersecurity Training : Regular updates and training sessions help fortify an organization's last line of defense — its people.
* Social Engineering Defense : Elevating awareness about phishing and social engineering tactics remains imperative, as these methods often precipitate identity breaches.
Putting It All Together: An Integrated Approach
For organizations to effectively tackle identity breaches, an integrated approach is critical—synthesizing robust security protocols, cutting-edge technologies, and a culture of perpetual vigilance.
* Incident Response Plans : These must be meticulously crafted and regularly tested to ensure swift, efficient countermeasures are in place.
* Continuous Monitoring : Automated systems that patrol network activities 24/7 to spot and neutralize threats before they escalate.
This era demands a holistic rethink of traditional concepts of identity security, shifting toward an indiscriminating focus on safeguarding identities at every juncture.
Identity Thefts and Turning the Tide
In the coming years, organizations must embrace a mindset of continuous improvement in response to rapidly advancing threat landscapes. Ensuring regulatory compliance, preserving corporate integrity, and maintaining public trust depend on it. Thus, robust identity breach detection is non-negotiable.
As once said, "It's not a matter of if, but when you'll be faced with an identity breach." Preparedness is your silver bullet in dodging disaster.
*
Vendor Diligence Questions
1. What are the vendor’s protocols for monitoring and responding to identity breaches?
2. Can the vendor provide documented examples of past identity breach detection success?
3. How does the vendor’s solution integrate with our existing security infrastructure and monitoring systems?
Action Plan
Conduct a comprehensive review of current identity protection and detection systems.
Implement multifactor authentication across all user access points.
Schedule mandatory cybersecurity training sessions focused on identifying identity theft indicators.
Enhance existing behavior analysis software to improve anomaly detection capability.
Establish a dedicated task force to lead regular drills on incident response.
*
Source: How to Detect Identity Breaches (Before It’s Too Late) | UpGuard
How Not to NIS: Tackling Compliance with Essential Services
_Think navigating compliance for Essential Services is simple? Think again._
What You Need to Know
The revised NIS 2 Directive is transforming the cybersecurity landscape, imposing stringent compliance requirements on Operators of Essential Services (OES) across Europe. Organizations must prioritize cybersecurity resilience and compliance to avoid substantial penalties. Immediate steps involve implementing robust risk assessments, enhancing incident response capabilities, and ensuring third-party vendor security measures align with new standards.
CISO Focus: Compliance and Regulation
Sentiment: Neutral
Time to Impact: Immediate to Short (3-18 months)
*
In the ever-evolving landscape of cybersecurity, compliance is more than a statutory obligation—it's a strategic advantage. The recent revision of the Directive on Security of Network and Information Systems, known as NIS 2, has ushered in new compliance requirements for Operators of Essential Services (OES) across Europe. As digital infrastructure becomes increasingly critical, understanding these compliance guidelines has never been more crucial.
Navigating the NIS 2 Directive
The NIS 2 Directive is an ambitious policy aimed at fortifying the cybersecurity landscape of essential services like energy, transport, health, and finance. It builds on the original 2016 directive but expands its scope, increases stringency, and unequivocally places cybersecurity at the forefront of EU policy. For OES, this means grappling with a breadth of compliance measures, from internal risk assessments to external reporting.
Key changes under NIS 2 include:
Expanded Scope: The directive now covers more sectors and a broader range of entities, compelling even small and medium enterprises in specified sectors to comply.
Stricter Penalties: Non-compliance can result in severe financial penalties and reputational damage, making adherence an organizational priority.
Enhanced Security Requirements: Emphasis is placed on implementing security measures, including risk management practices and incident reporting obligations.
The Compliance Quagmire
For many organizations, achieving NIS 2 compliance may feel like navigating a bureaucratic quagmire. The directive demands meticulous attention to detail regarding risk management, incident reporting, and the security of supply chain providers. This level of scrutiny requires a dedicated compliance strategy and a shift in organizational culture towards prioritizing cybersecurity resilience.
To comply, businesses must:
Conduct Comprehensive Risk Assessments: These should identify vulnerabilities in digital infrastructure, prioritize risks, and guide remediation efforts.
Strengthen Incident Response Plans: Organizations are mandated to report significant incidents within a predetermined timeframe, necessitating agile and effective response protocols.
Ensure Supplier Security Measures: Companies must thoroughly vet vendor cybersecurity practices to safeguard against third-party risks.
Impact and Timing
The stipulations of the NIS 2 Directive have an immediate impact on affected organizations. Entities must act swiftly to align their practices with these elevated security standards, with compliance efforts ideally in full swing within the next 18 months. While the long-term benefits include fortified cybersecurity postures and enhanced trust, the immediate burdens of compliance are substantial.
Compliance as a Strategic Imperative
While NIS 2 compliance may initially seem daunting, it also represents a strategic imperative. Meeting these requirements can position organizations as leaders in cybersecurity resilience, building trust among customers and stakeholders. Moreover, the framework pushes businesses to adopt best practices that inherently strengthen operational integrity and mitigate risks.
Ultimately, embracing a proactive compliance strategy can yield significant competitive advantages, transforming what might be perceived as regulatory burdens into opportunities for innovation and improvement.
*
Vendor Diligence Questions
1. How does your organization ensure compliance with the latest version of the NIS 2 Directive in its cybersecurity practices?
2. Can you detail your risk management processes and how they align with NIS 2 compliance standards?
3. What procedures are in place for rapid incident reporting to meet the directive's requirements?
Action Plan
1. Initiate a Gap Analysis: Conduct a comprehensive review to assess current compliance standing against NIS 2 requirements.
2. Develop a Compliance Roadmap: Align internal policies and processes with the directive's guidelines, setting targeted milestones for implementation.
3. Enhance Training Programs: Provide ongoing education for staff to understand NIS 2 expectations and their role in achieving compliance.
4. Evaluate Vendor Security: Rigorous supplier assessments and audits should ensure third-party alignment with NIS 2 standards.
5. Revise Incident Response Strategies: Establish clear protocols for swift incident reporting and response to meet directive timelines.
*
Source: Securing Essential Services: NIS Compliance Guidelines for OES | UpGuard
*
_CISO Intelligence is lovingly curated from open source intelligence newsfeeds and is aimed at helping cybersecurity professionals be better, no matter what their stage in their career._
_We’re a small startup, and your subscription and recommendation to others is really important to us._
*Thank you so much for your support!(

